February 28, 2006

"Project Higgins”: a new open source initiative



IBM, Novell and Parity Communications announced that they are contributing code to an open source initiative -- code-named "Project Higgins” -- that will spawn a new generation of security software, giving people more control over their personal online identity information. Project Higgins builds upon a concept developed by Harvard Law School’s Berkman Center for Internet & Society by John Clippinger and Paul Trevithick.

“The Internet has changed the way consumers think about privacy, and Higgins will help change the way people manage their personal identity information”

Dale Olds,Engineer at Novell.

Article at Technology Review: Identity 2.0

February 27, 2006

Analysis: RFID privacy debate leaves questions unanswered


Today ITNEWS.COM.AU, publishes this article about privacy & RFID.
By Laurie Sullivan

Analysis: RFID privacy debate leaves questions unanswered

A fiery debate on privacy at the AIM Global conference late Thursday unearthed more questions and problems than answers and solutions.The panel debate was focused on concerns around lack of communication by government agencies, and privacy and security of personal data used in connection with radio frequency identification (RFID) technology.

Read more at ITNEW.COM.AU

Links:

European events:
From RFID to the "Internet of things" (Brussels, Belgium, 6 - 7 March 2006)
The RFID Revolution. High level conference on 9 March 2006 at Cebit 2006

RFID news:
RFID journal

RFID & Privacy:
EPIC (rfid)
EFF (rfid)

February 24, 2006

Stronger Laws Needed to Protect Privacy, CDT Report Finds

A new report by the Center for Democracy & Technology details a widening gap between the technology that collects sensitive personal data and the laws designed to protect that data against government misuse.

CDT Report: Digital Search and Seizure

February 23, 2006

Reality Mining


Despite having a history of social science that spans several decades, we still have a relatively poor understanding of why humans behave the way they do.

Reality Mining is a project developed at MIT and Nokia, that defines the collection of machine-sensed environmental data pertaining to human social behavior. This new paradigm of data mining makes possible the modeling of conversation context, proximity sensing, and temporospatial location throughout large communities of individuals. Mobile phones (and similarly innocuous devices) are used for data collection, opening social network analysis to new methods of empirical stochastic modeling.

Links:

Reality Mining Project (MIT Media Lab)

Human Dynamics Group (MIT Media Lab)

Sociable Media Group (MIT Media Lab)

Danah Boyd Danah's blog Secure ID (Danah is a PhD student on online social networks)

February 22, 2006

Privacy & Data mining


Data mining is the practice of automatically searching large stores of data for patterns.

From WIKIPEDIA:

"There are many legitimate uses of data mining. For example, a database of prescription drugs taken by a group of people could be used to find combinations of drugs exhibiting harmful interactions. Since any particular combination may occur in only 1 out of 1000 people, a great deal of data would need to be examined to discover such an interaction. A project involving pharmacies could reduce the number of drug reactions and potentially save lives. Unfortunately, there is also a huge potential for abuse of such a database.

Essentially, data mining gives information that would not be available otherwise. It must be properly interpreted to be useful. When the data collected involves individual people, there are many questions concerning privacy, legality, and ethics."

As we can see it is hard to find a balance between privacy & data mining but it can means a lot of profit to enterprises.

To find more:

K.A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, Center for Advanced Studies in Science and Technology Policy. 5 Colum. Sci. & Tech. L. Rev. 2 (December 2003).

"In this data-mining society, privacy advocates shudder" at Seattle Post-Intelligencer

"Data Mining in Depth:Data Mining and Privacy Column" published in DM Review MagazineDecember 2003 Issue

"The Value of Trust Through Privacy" at CIOINSIGHT.COM. How Hilton collects personal information from its customers through loyalty programs

February 21, 2006

APEC symposium on information privacy protection in e-commerce


The first formal meetings of APEC(Asia-Pacific Economic Cooperation) Viet Nam 2006 have begun with a series of seminars and workshops in Ha Noi.

The Symposium on Information Privacy Protection in E-Government and E-Commerce as well as several other meetings commenced today in the lead up to the First APEC Senior Officials Meeting of 2006 on March 1-2.

Webcasts and podcasts of today's presentations are available for download at APEC.ORG

February 20, 2006

Privacy Guardian Is Still a Paper Tiger

This is an article published at LOS ANGELES TIMES

Privacy Guardian Is Still a Paper Tiger

A year after its creation, the White House civil liberties board has yet to do a single day of work.

By Richard B. Schmitt, Times Staff Writer

"WASHINGTON — For Americans troubled by the prospect of federal agents eavesdropping on their phone conversations or combing through their Internet records, there is good news: A little-known board exists in the White House whose purpose is to ensure that privacy and civil liberties are protected in the fight against terrorism.Someday, it might actually meet."

Read more at: LOS ANGELES TIMES

February 18, 2006

Who is your privacy officer?



Who is your privacy officer?
article published at OUT-LAW News, 17/02/2006

"Most FTSE 100 firms are unable to respond properly to a request to speak to the company’s Privacy Officer, according to research from Marketing Improvement. The marketing services firm found that only 28% of companies could direct the query to the correct person."

Full article at OUT-LAW

February 17, 2006

Copyright and Consumer Protection: A New Role or Oxymoron?

Pamela Samuelson will speak as part of the IP Speakers Series, co-sponsored by BCLT at boalt.org

Copyright and Consumer Protection: A New Role or Oxymoron?

February 22 (Wednesday) Boalt Hall 140 ~ 12:45 - 1:45 pm

Selected papers by Pamela Samuelson

February 16, 2006

NO2ID


NO2ID is the non-partisan UK-wide campaign opposing the government's planned ID card and National Identity.

February 10, 2006

Trust and . ..


Trust is just amazing.

What is trust? Let's wikipedia.

Trust in sociology is a relationship between people. It involves the suspension of disbelief that one person will have towards another person or idea. It especially involves having one person thinking that the other person or idea is benevolent, competent / good, or honest / true.

And Oprah Winfrey apologized to her national television audience last january for defending James Frey.

And why Oprah repaired her damaged personal brand.

Knowledge Wharton publishes this article about Trust/Oprah,


A Million Little Embellishments: Truth and Trust in Advertising and Publishing

February 09, 2006

Google Desktop3 and privacy

Jefferson Graham publishes this article in USA TODAY

Google's newest search tool raises privacy concerns

"Google Desktop 3, the latest version of software that helps users find files on personal computers, has a new feature that can track data from multiple PCs. To do that, it copies personal text files to Google servers, which eventually route them back to the PCs. Previous versions merely indexed files, without storing copies at Google."

See more at USA TODAY

Links:

Google Upgrades Desktop Red Herring
Google's Offers New Search Feature ABC News
New Google Desktop grabs more of Microsoft's turf Reuters

February 08, 2006

Surveillance cameras to be installed in Korean prison cells

Source: Korea.net

Republic of Korea plans to install closed-circuit television (CCTV) cameras inside prison cells in a bid to prevent prisoners from committing suicide.

The Ministry of Justice said last december that it will revise the law governing the country's management of correctional facilities to allow installation of surveillance cameras inside jail cells, and confining unstable inmates to isolated and secure facilities.

See more at Korea.net

February 07, 2006

Privacy Networks Launches First Platform With Integrated Spam...







Privacy Networks Launches First Platform With Integrated Spam, Virus Protection and Searchable Email Archiving

Privacy Networks Press Release

FORT COLLINS, Colo., Feb. 6, 2006 – Privacy Networks, the email integrity company, today announced a new integrated email management platform designed to replace multiple point solutions with a single system that combines complete spam and virus protection with easily searchable email archiving capabilities.

Privacy Networks’ Email Integrity Suite™ (EIS) provides superior protection, ease-of-use and business management capabilities for corporations, government, healthcare, managed service providers and hardware systems manufacturers looking for a single-source, comprehensive email integrity solution.

February 06, 2006

Privacy Threats Are Everywhere



By James R. Hood
ConsumerAffairs.Com
February 6, 2006

Despite the widespread fears of online trickery, most identity theft takes place offline and is remedied more quickly when it's discovered online, a new report finds.

This runs counter to the popular notion that spyware, spam, phishing and clever scams are the biggest threats to our personal and financial security. Quite the opposite, according to the 2005 Javelin Identity Fraud Survey Report, released by the Better Business Bureau last week.

Full article at Consumer Affairs

February 03, 2006

EFF Sues AT&T to Stop Illegal Surveillance


The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T Tuesday, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in its massive and illegal program to wiretap and data-mine Americans' communications. Full story, EFF case page

More Links

EFF Files Class-Action Surveillance Suit at Technology Review
Brad King's blog at Technology Review

Verbatim: Search firms surveyed on privacy




Verbatim: Search firms surveyed on privacy
By Declan McCullagh and Elinor Mills Staff Writer
CNET News.com
Published: February 3, 2006, 4:00 AM PST


To find out what kind of information the four major search companies retain about their users, CNET News.com surveyed Microsoft, AOL, Yahoo and Google.

We asked the same seven questions of each company. Their answers are reproduced below, with the responses sorted by the companies' names in alphabetical order.

Full article at CNET News.com

February 02, 2006

Conference on safeguards in a world of ambient intelligence


Great news ¡ ¡

Conference on safeguards in a world of ambient intelligence

Organised by the SWAMI consortium and sponsored by European Commission

EuroVillage Hotel, Brussels, 21-22 March 2006

AGENDA (DRAFT VERSION)

Please, see SWAMI WEB SITE

DAY 1 Threats and vulnerabilities posed by AmI


DAY 2 Safeguards and Policy options


By the way these reports are available at SWAMI:

Dark scenarios in ambient intelligence: Highlighting risks and vulnerabilities. Deliverable D2, Final version, January 2006.

The brave new world of ambient intelligence: A state-of-the-art review. Deliverable D1, Final version, January 2006.

February 01, 2006

Center for Research on Computation and Society


The Center for Research on Computation and Society (CRCS) at Harvard University, was founded to develop a new generation of ideas and technologies designed to address some of society's most vexing.

For the 2005-06 academic year, CRCS will explore the scientific and social challenges of maintaining basic rights of privacy and security in a wired world.

Privacy saved my life

Blog Archive

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.